Skip to content

Taiwan adds China’s Huawei, SMIC to export blacklist

Technology
43 13 0
  • 44 Stimmen
    7 Beiträge
    4 Aufrufe
    S
    I still get calls, but I can't see details (e.g. just the phone number, not the caller).
  • 6 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • ICE Taps into Nationwide AI-Enabled Camera Network, Data Shows

    Technology technology
    80
    1
    488 Stimmen
    80 Beiträge
    4 Aufrufe
    Z
    Their problem with China is the supposed atheism, and that they're not christian fundamentalists.
  • 31 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    3 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Mazda DMCA takedown of Open Source Home Assistant App

    Technology technology
    6
    108 Stimmen
    6 Beiträge
    5 Aufrufe
    S
    Soon this all will be much easier. From 12 of September we’re going into a new world of EU Data Act that forces all companies to allow third parties to communicate with iot devices. Which a car is. So soon Mazda will need to provide those APIs in an official way.
  • The mystery of $MELANIA

    Technology technology
    13
    1
    25 Stimmen
    13 Beiträge
    8 Aufrufe
    geekwithsoul@lemm.eeG
    Archive
  • 44 Stimmen
    4 Beiträge
    4 Aufrufe
    G
    It varies based on local legislation, so in some places paying ransoms is banned but it's by no means universal. It's totally valid to be against paying ransoms wherever possible, but it's not entirely black and white in some situations. For example, what if a hospital gets ransomed? Say they serve an area not served by other facilities, and if they can't get back online quickly people will die? Sounds dramatic, but critical public services get ransomed all the time and there are undeniable real world consequences. Recovery from ransomware can cost significantly more than a ransom payment if you're not prepared. It can also take months to years to recover, especially if you're simultaneously fighting to evict a persistent (annoyed, unpaid) threat actor from your environment. For the record I don't think ransoms should be paid in most scenarios, but I do think there is some nuance to consider here.